12-12-2018 01:53 AM - edited 03-12-2019 07:10 AM
Hi All,
I have setup a Network Discovery policy to discovery users, host and application for my internal network address range only. Do I now need to create a monitor rule in my ACP for Network Discovery to work correctly, such as permitting all IP traffic from my internal network and setting to monitor, or will it work ok for traffic that I have simply permitted in my rules? I understand that Network Discovery will not match traffic that has been blocked (which is my default rule). Is that correct?
Sorry if this is a simple question but I'm not sure what the correct approach is to ensure that FMC discovers all of my network assets correctly.
Thank you
Solved! Go to Solution.
12-12-2018 01:59 AM
12-12-2018 10:30 AM
as Phil said, instead of 0.0.0.0 will build and consume all your host limit (by default the limit is 50,000 host)
once you put your interested network to discover than you can build up your security policy ACP, NAP, Intrustion prevision etc.)
remember discovery is the first step/stage to build up your network security.
once your discovery policy in action (also remember discovery policy is a passive) you will see the host (windows,linux etc) with vulnerability (for example FMC learn about windows-7 server pack1) it will give you what vulnerability with server pack 1.
hope that help you.
12-12-2018 01:59 AM
12-12-2018 10:30 AM
as Phil said, instead of 0.0.0.0 will build and consume all your host limit (by default the limit is 50,000 host)
once you put your interested network to discover than you can build up your security policy ACP, NAP, Intrustion prevision etc.)
remember discovery is the first step/stage to build up your network security.
once your discovery policy in action (also remember discovery policy is a passive) you will see the host (windows,linux etc) with vulnerability (for example FMC learn about windows-7 server pack1) it will give you what vulnerability with server pack 1.
hope that help you.
12-14-2018 08:32 AM
Hi,
Thank you for the response.
You mention that Network Discovery function works based on traffic the managed device
has visibility of, so what if the managed device is configured to block all traffic? Will it still have visibility or does traffic need to be permitted though the device using a ACP permit rule for this to work?
12-14-2018 09:28 AM - edited 12-14-2018 09:30 AM
why you want to block all the traffic? any reason?
if your ACP is setup as block than it will come to decision on default policy (if you have default policy also has block setup) in that case all communication will be drop and you have no connection to FTD/ASA and this also apply to other network internal network/DMZ network.
see the attachment of the pack flow in firepower.
12-14-2018 09:35 AM
Sorry I meant block all as my default action. That packet flow makes sense and answers my question.
Thank you
12-14-2018 09:38 AM
Thank glad i was help you.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide